-
Method of function realization for transformation etalons in risk analysis and assessment
Extended classification of methods of social engineering
The risk assessment method of information security based on open databases vulnerabilities
Social engineering as a method of information and telecommunication systems intelligence
ІМІТАЦІЙНЕ МОДЕЛЮВАННЯ РОБОТИ СИСТЕМИ КВАНТОВОГО ПРЯМОГО БЕЗПЕЧНОГО ЗВ'ЯЗКУ ІЗ...
Training quality assessment of information security specialists
The detection method of identification terms for intrusion detection system
Методологія синтезу та програмна реалізація системи оцінювання шкоди національній...
МОДЕЛЬ ОЦІНКИ ЯКОСТІ ЕКСПЕРТА ДЛЯ ПІДВИЩЕННЯ ОБ’ЄКТИВНОСТІ ЕКСПЕРТИЗ У СФЕРІ...
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only entries containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"